CS IT. Lecture (06) STP (I) Problem statement. By: Dr. Ahmed ElShafee
|
|
- Dorcas Allen
- 6 years ago
- Views:
Transcription
1 Lecture (06) STP (I) By: Dr. Ahmed ElShafee CS IT Problem statement If your network consists of layer 2 switches that allow computers connect and exchange data, you will need to consider the design that can withstand some types of failure: Redundant Connections ١ Dr. Ahmed ElShafee, ACU : Spring 2016, Practical App. Networks I ٢ Imagine that the SW1, SW2 and SW3 switches connect many devices and there is only a single connection between the switches links between the switches break, the communication between many devices fail. Such design creates a single point of failure. We could easily enhance this simple design to make it more resilient by adding an extra path between SW2 and SW3 ٣ ٤
2 creating the extra path here comes at a cost. The redundant connection between SW2 and SW3 creates a loop. The loop in turn, will create three serious problems. The last one in the list will eventually render our system unavailable. 1. Duplicate Frame Delivery ٥ ٦ SW2 and SW3 do not have the MAC address of PC3 ( ) in their databases This can happen if the PC3 doesn't speak for more than five minutes (This is the default time MAC address is kept in the database without refreshing it) Then, we have PC1 sending frame towards PC3. As you recall, SW2 will flood the frame out of its active ports if it does not know where PC3 is located (unknown destination MAC address). The frame travels out SW2's port F0/13 towards SW1 and out the port F0/12 towards SW3. ٧ ٨
3 SW2 will deliver the frame to PC3. Since SW3 floods the frame out as well, it will be sent towards SW1 out of its port F0/14. Then, SW1 obediently delivers the same copy of the frame to PC3 again 2. MAC Address Table Instability switches change the MAC addresses depending on where they hear the sender. ٩ ١٠ PC1 sends the frame to PC3 (destination MAC: ). SW2 floods the frame out F0/12 and F0/13 ports. SW3 receives this frame sourced with MAC address (PC1). It learns the source MAC address and maps it to its F0/12 port where it arrived. SW1 does not know where PC3 is connected (at least right now) it will flood this frame out all active ports. This way, the frame is sent out SW1's port F0/14 towards SW3. SW3, upon receiving the frame on its F0/14 port, reads the source MAC address ( ) and maps it to port F0/14 this time. ١١ ١٢
4 This causes a little confusion as SW3 learned it earlier on and it was port F0/12 before. Previous mapping is removed and F0/14 becomes the outbound port for now. 3. Broadcast Storm problem is really severe. It can bring our traffic to a halt ١٣ ١٤ Spanning Tree Protocol Overview PC1 sends a broadcast frame. SW2 upon receiving it, floods it out all its active ports. SW1 receives it on port F0/13 and floods it out of other ports. SW3 receives the broadcast frame on its F0/12 port and floods it. it receives this same broadcast frame from SW1 and again it floods it out all active ports except the port it arrived on STP is a layer 2 loop prevention mechanism. Switches running this protocol use special frames called Bridge Protocol Data Unit (BPDU). These frames contain enough information to allow the switches to create a loop free topology. This is accomplished using three distinct phases: ١٥ ١٦
5 1. Elect a single switch to be the root bridge machine which is the central device in the layer 2 network. This machine will have all its ports in the forwarding state (designated port role). 2. All other switches (non root switches), will select a single path towards the root bridge. That port is called the 'root port' and will be forwarding traffic that is destined out of the switch through the root bridge. This path is the least cost (best) path towards the root. 3. All other switches will select a single path per segment in order to block stop the loop. The port that is forwarding traffic is called designated port. The port that is blocking traffic to stop the loop is called non designated port. ١٧ SW1 has been elected as the root bridge. SW2 uses port F0/13 as its root port (the best, or the least cost path towards the root). ١٨ SW3 uses it port F0/14 as the root port. SW3 blocks the port F0/12 to stop the loop. SW2 keeps sending BPDU frames originated by the root bridge (SW1) out its F0/12 port towards SW3. Spanning Tree Protocol Terminology The ports participating in STP play different roles and those roles use different states of operation: Spanning Tree Port Roles Root Port (RP) It is a port on a non root switch, which is the shortest (the best) path towards the root bridge. Root bridge does NOT have any root ports. (no shortest path to itself. ١٩ ٢٠
6 Designated Port (DP) It is a port that is in the forwarding state. All ports of the root bridge are designated ports (they are never in a blocking state). BPDU frames our sent out this port. Non Designated Port (NDP) It is a port that is in a blocking state in the STP topology. ٢١ ٢٢ Spanning Tree Port States Disabled The port in this state does not participate in the STP operation (it is shut down). Blocking The port does NOT forward any Ethernet frames, does NOT accept any Ethernet frames (discards arriving frames), does NOT learn any MAC addresses. However, the port DOES process BPDU frames received from a neighboring switch. If the port transitions to this state (blocking), it can stay blocked for 20 seconds by default (max_age). Listening The port in this state CAN send and receive the BPDU frames. However, the port in this state does NOT learn any MAC addresses, and does NOT forward or process incoming frames either. All Ethernet frames are being discarded. The computation of loop free topology takes place in this state. If the port transitions to this state (listening), it can stay in this state for 15 seconds by default (forward_delay). ٢٣ ٢٤
7 Learning The port in this state already knows its role (root port or designated port ) in the STP domain. However, the port will not forward any Ethernet frames yet. It will be learning MAC addresses from the frames arriving at the port in order to populate MAC address table. This helps avoid too much flooding when the port transition to the forwarding state. If the port transitions to this state (learning), it can stay in this state for 15 seconds by default (forward_delay). Forwarding The port in this state will forward all Ethernet frames as per switch operation. Also, the port will process all incoming Ethernet frames and will actively learn MAC addresses from the arriving traffic. ٢٥ ٢٦ Step one, root bridge Root Bridge Root bridge is the switch that has all ports working in the designated role. It will be the reference point Root bridge will impose the timers that other switches will use such as: hello time how often BPDUs are going to be sent/relayed (default timer=2 seconds), max age how long the configuration is valid (default timer=20 seconds), forward delay how long a port should be in ٢٧ listening/learning state (default timer=15 seconds). Root bridge will be announcing its presence by sending BPDU frames. Other switches will relay those frames out their designated port given the hello time. Also, the root bridge has all its ports in the designated role (forwarding). ٢٨
8 Root election is based on a single parameter that is found in the BPDU frame called: Bridge ID. The switch with the lowest Bridge ID becomes the root. Bridge ID has the following format: priority.base mac address Priority is configurable parameter that is used to elect the root bridge a device you want to be the root. The default value is: The lower the value is the more likely for a switch to become a root. Base Mac Address is the unique mac address every switch has been given by the manufacturer. It is a main parameter in case the priority on all switches is ٢٩ identical. ٣٠ start up all the switches and as soon as their ports transition to LISTENING state, they begin to send BPDU frames out of all active ports. In those frames both Bridge ID and Root ID parameters point to their own priority.base mac address value. Since they are processing the incoming BPDU's from the neighbors, SW2 and SW3 realize that SW1's Bridge ID is lower than theirs. From that point onwards, they begin to relay BPDU frames saying that SW1 as the root bridge. ٣١ ٣٢
9 example, For SW3 Bridge ID = Root ID = Step 2: Root Port Selection As soon as the root has been elected, all non root switches begin to calculate which port is the best (the least cost) towards the root bridge. This port will be called the root port. ٣٣ ٣٤ SW2, SW3 and SW4 receive BPDUs from different directions. For instance, SW2 will receive them on its port F0/1 and F0/2 The accumulative cost (the sum of the cost in the path towards the root), is taken into consideration. The lowest cost to reach the root becomes the root port. cost of path calculation: Each speed has its arbitrarily assigned cost which is configurable. A few examples are below: 10 Mbps = Mbps = 19 1 Gbps = 4 10 Gbps = 2 ٣٥ ٣٦
10 The root bridge (here SW1) is sending its BPDU frame every 2 seconds. It uses the parameter called: Root Path Cost in BPDU to advertise the cost to the root. It puts the value of '0' in it, as it is the root bridge and has no cost to itself. The frame is sent out its port F0/1 towards SW3 and F0/2 towards SW2. SW2, upon receiving it, adds the cost used to reach the sender of BPDU based on the predefined speed to cost value (all ports in our topology are ٣٧ FastEthernet=19). Root Path Cost = = 19 via F0/2 SW2 is going to advertise its best (as of now) cost out of F0/1 port towards SW3. SW3 will receive BPDU from SW1 with the Root Path Cost=0 on its F0/1 port. It will also receive BPDU from SW2 on its F0/2 interface with the Root Path Cost=19. SW3; As both ports have the cost of 19 towards those BPDU senders, the following math is done to choose the least cost path towards the root bridge Root Path Cost = = 19 via F0/1 ٣٨ Root Path Cost = = 38 via F0/2 It is clear that the direct connection towards root bridge via F0/1 is going to be selected as the root port. SW3 has the least cost towards equal 19 (via F0/1 port). This cost is going to be added to Root Path Cost while it sends the BPDUs out F0/2, F0/3 and F0/4. Of course, SW2 also chooses its F0/2 port as the root port since the cost is smaller. if the Root Cost Path is identical! hat situation on SW4. It receives BPDUs on its ports F0/1 and F0/2 with the following parameters: Bridge ID = Root ID = Root Path Cost = 19 ٣٩ ٤٠
11 refer the lowest port priority of the sender. That parameter has a default value 128 and is configurable. The designated switch (SW3), is the same switch i.e. the same Bridge ID ( ). The designated switch (SW3) sends BPDUs out of its F0/3 and F0/4 ports with the same priority = 128 lowest Port ID where BPDU frames arrive on SW4. Port f0/3 becomes the root port since F0/3 is lower than F0/4 on SW3. ٤١ ٤٢ The following algorithm is used to determine the root port or designated port (in order): 1. Prefer the lowest Root Path Cost. 2. In case of the same Root Path Cost, prefer the lowest Bridge ID of the designated switch (the neighbor that sends BPDUs). 3. In case of receiving BPDUs on multiple ports from the same designated switch (BPDU sender), prefer the lowest port priority of the sender. That parameter has a default value 128 and is configurable. 4. In case of all above are did not resolve the problem, prefer the lowest Port ID of the BPDU sender. Step 3: Designated Port Selection. This procedure follows exactly the same algorithm used for root port selection. ٤٣ ٤٤
12 Since root port is the best port towards the root bridge it is going to be in the forwarding state Root Path Cost advertised by SW2 is 19 and so is the cost advertised by SW3. SW2 has lower Bridge ID ( ) than SW3 ( ). SW3 must block its F0/2.. And last selection is going to happen between SW3 (port F0/4) and SW4 (port F0/2). Root Path Cost Advertised by SW3 is 19, but SW4 advertises its cost as 38 (two hops via F0/1). SW4 blocks its port F0/2 (nondesignated), the SW3 promotes its port F0/4 to designated role (forwarding). ٤٥ ٤٦ This process happens in the LISTENING state of all ports. Since the topology has been computed and does not have loops (blocking appropriate ports), it is safe to move to next states: learning and finally forwarding. Thanks,.. See you next week (ISA), ٤٧ ٤٨ Dr. Ahmed ElShafee, ACU : Spring 2016, Practical App. Networks I
Lecture (08) STP - CDP. Dr. Ahmed M. ElShafee CDP STP. tweak this simple design to make it more resilient by adding
Lecture (08) STP - CDP STP CDP Dr. Ahmed M. ElShafee ١ ٢ Such design creates a single point of failure. We could easily tweak this simple design to make it more resilient by adding an extra path between
More information3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP)
3. INTERCONNECTING NETWORKS WITH SWITCHES. THE SPANNING TREE PROTOCOL (STP) 3.1. STP Operation In an extended Ethernet network (a large network, including many switches) multipath propagation may exist
More informationEIGRP Features and Operation
EIGRP Features and Operation Enhanced IGRP (EIGRP) is a classless, enhanced distance-vector protocol. EIGRP is a Cisco proprietary protocol. EIGRP includes the subnet mask in its route updates. And as
More informationChapter 5. Spanning Tree Protocol (STP) Part I
Chapter 5 Spanning Tree Protocol (STP) Part I CCNA3-1 Chapter 5-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.
More informationObjectives. 1. Introduction:
University of Jordan Faculty of Engineering & Technology Computer Engineering Department Advance Networks Laboratory 0907529 Exp.5 Spanning-Tree Protocol (STP) Objectives 1. Explain the role of redundancy
More informationImplement Spanning Tree Protocols-PART-I. LAN Switching and Wireless Chapter 5 Modified by Tony Chen 05/01/2008
Implement Spanning Tree Protocols-PART-I LAN Switching and Wireless Chapter 5 Modified by Tony Chen 05/01/2008 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Notes: If you
More informationImplementing Spanning Tree Protocol
Transparent Bridging Implementing Spanning Tree Protocol A switch has the same characteristics as a transparent bridge., Cisco Systems, Inc. All rights reserved. 2-1, Cisco Systems, Inc. All rights reserved.
More informationConfiguring STP. Understanding Spanning-Tree Features CHAPTER
CHAPTER 11 This chapter describes how to configure the Spanning Tree Protocol (STP) on your switch. For information about the Rapid Spanning Tree Protocol (RSTP) and the Multiple Spanning Tree Protocol
More informationSTP (Spanning Tree Protocol) - Step by Step Configuration Tutorial
STP (Spanning Tree Protocol) - Step by Step Configuration Tutorial Introduction: Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on switches. It was first introduced as CST (Common Spanning
More informationTop-Down Network Design, Ch. 7: Selecting Switching and Routing Protocols. Top-Down Network Design. Selecting Switching and Routing Protocols
Top-Down Network Design Chapter Seven Selecting Switching and Routing Protocols Copyright 2010 Cisco Press & Priscilla Oppenheimer 1 Switching 2 Page 1 Objectives MAC address table Describe the features
More informationLayer 2 Engineering Spanning Tree
Layer 2 Engineering Spanning Tree Campus Network Design & Operations Workshop These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationSpanning-Tree Protocol
Spanning-Tree Protocol Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Redundancy in a converged network Spanning-Tree Protocol (STP) STP Operation
More informationSpanning-Tree Protocol
Spanning-Tree Protocol Agenda» What Problem is Solved by STP?» Understanding STP Root Bridge Election» BPDU Details and Pathcost» Understanding STP Root and Designated Port Election» Understanding and
More informationIntroduction to OSPF
Campus Networking Introduction to OSPF Workshop Campus Layer-2 Networking Network Workshop Design These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license
More informationSpanning Tree Protocol, from a feature CCNA s Perspective.
Spanning Tree Protocol, from a feature CCNA s Perspective. written by Gerald C. Paciello Jan. 29, 2015 A little bit of history. Before we talk about Spanning Tree Protocol, let's organize the different
More informationCampus Networking Workshop. Layer 2 engineering Spanning Tree and VLANs
Campus Networking Workshop Layer 2 engineering Spanning Tree and VLANs Switching Loop When there is more than one path between two switches What are the potential problems? Switching Loop If there is more
More informationSpanning Trees and IEEE 802.3ah EPONs
Rev. 1 Norman Finn, Cisco Systems 1.0 Introduction The purpose of this document is to explain the issues that arise when IEEE 802.1 bridges, running the Spanning Tree Protocol, are connected to an IEEE
More informationConfiguring Spanning Tree
CHAPTER 8 Configuring Spanning Tree This chapter describes how to configure spanning tree on the Catalyst enterprise LAN switches. Note For information on configuring the PortFast, UplinkFast, and BackboneFast
More informationChapter 5: STP. * What is STP? How does STP work?
Chapter 5: STP * What is STP? How does STP work? * What would be the worst case scenario that could happen to a redundant path switched network with the STP is disabled? When multiple paths exist between
More informationSpanning Tree Protocol
For conceptual information about, see the Using the with the EtherSwitch Network Module section of the EtherSwitch Network feature module. Finding Feature Information, page 1 Information About, page 1
More informationConfiguring STP and RSTP
7 CHAPTER Configuring STP and RSTP This chapter describes the IEEE 802.1D Spanning Tree Protocol (STP) and the ML-Series implementation of the IEEE 802.1W Rapid Spanning Tree Protocol (RSTP). It also explains
More informationUnderstanding Rapid Spanning Tree Protocol (802.1w)
Understanding Rapid Spanning Tree Protocol (802.1w) Contents Introduction Support of RSTP in Catalyst Switches New Port States and Port Roles Port States Port Roles New BPDU Format Full View of the Cisco
More informationSpanning Tree Protocol(STP)
Introduction Spanning Tree Protocol (STP) is a Layer 2 protocol that runs on bridges and switches. The specification for STP is IEEE 802.1D. The main purpose of STP is to ensure that you do not create
More informationisco Understanding Spanning Tree Protocol Topology Chan
isco Understanding Spanning Tree Protocol Topology Chan Table of Contents Understanding Spanning Tree Protocol Topology Changes...1 Interactive: This document offers customized analysis of your Cisco device...1
More informationCopyright 2014 CertificationKits LLC. All Rights Reserved. 2
Copyright 2014 CertificationKits LLC. All Rights Reserved. 2 Spanning Tree Protocol is a bridge protocol that enables a learning bridge to dynamically work around loops in a network topology by creating
More informationThe Spanning Tree Protocol
Università Ca Foscari di Venezia Dipartimento di Informatica Corso di Sistemi Distribuiti 2009 Presentation outline Introduction 1 Introduction Local internetworking Motivations 2 High level description
More informationPacket Switching on L2 (LAN Level)
Packet Switching on L2 (LAN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing Agenda Introduction Transparent Bridging Basics Principles Broadcast
More informationTable of Contents. Cisco Understanding Rapid Spanning Tree Protocol (802.1w)
Table of Contents Understanding Rapid Spanning Tree Protocol (802.1w)...1 Introduction...1 Support of RSTP in Catalyst Switches...2 New Port States and Port Roles...2 Port States...2 Port Roles...3 New
More informationPacket Switching on L2 (LAN Level)
Packet Switching on L2 (LAN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing Agenda Introduction Transparent Bridging Basics Spanning Tree Protocol
More informationConfiguring Spanning Tree Protocol
CHAPTER 7 This chapter descibes how to configure Spanning Tree Protocol (STP) on the Cisco wireless mobile interface card (WMIC). Note For complete syntax and usage information for the commands used in
More informationMaintaining Specific VLAN Identification. Comparing ISL and 802.1Q. VLAN Trunking
Maintaining Specific VLAN Identification Specifically developed for multi-vlan interswitch communications Places a unique identifier in each frame Functions at Layer 2 2003, Cisco Systems, Inc. All rights
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 351-001 Title : CCIE Cisco Certified InterNetworking Expert Vendors : Cisco
More informationBridging Transmitting Non-IP Traffic or Merging Two Networks
10 Bridging Transmitting Non-IP Traffic or Merging Two Networks Contents Overview..................................................... 10-3 Transmitting Non-IP Traffic..................................
More informationChapter 4 Configuring Switching
Chapter 4 Configuring Switching Using the Switching Tab The navigation tabs on the top of the home page include a Switching tab that lets you manage your GS108T Gigabit Smart Switch using features under
More informationToken Ring VLANs and Related Protocols
Token Ring VLANs and Related Protocols CHAPTER 4 Token Ring VLANs A VLAN is a logical group of LAN segments, independent of physical location, with a common set of requirements. For example, several end
More informationConfiguring Rapid PVST+
This chapter contains the following sections: Information About Rapid PVST+, page 1, page 16 Verifying the Rapid PVST+ Configuration, page 24 Information About Rapid PVST+ The Rapid PVST+ protocol is the
More informationRedundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 802.1w)
Redundancy in Substation LANs with the Rapid Spanning Tree Protocol (IEEE 0.1w) Michael Galea, Marzio Pozzuoli RuggedCom Inc. - Industrial Strength Networks Woodbridge, Ontario, Canada Introduction Ethernet
More informationTroubleshooting Transparent Bridging Environments
CHAPTER Troubleshooting Transparent Bridging Environments Transparent bridges were first developed at Digital Equipment Corporation (Digital) in the early 1980s and are now very popular in Ethernet/IEEE
More informationUnderstanding and Configuring STP
CHAPTER 14 This chapter describes how to configure the Spanning Tree Protocol (STP) on a Catalyst 4500 series switch. It also provides guidelines, procedures, and configuration examples. This chapter includes
More informationCS3600 SYSTEMS AND NETWORKS
CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 20: Bridging Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui
More informationCharacterization of the Spanning Tree Protocol
Characterization of the Spanning Tree Protocol Eduard Bonada Master thesis submitted in partial fulfillment of the requirements for the degree: Master Program in Information, Communication and Audiovisual
More information802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP)
13 802.1w Rapid Spanning Tree Protocol (RSTP) 802.1d Spanning Tree Protocol (STP) Contents Overview.................................................... 13-2 How Spanning Tree Operates.................................
More informationTransparent Bridging and VLAN
Transparent Bridging and VLAN Plug and Play Networking (C) Herbert Haas 2005/03/11 Algorhyme I think that I shall never see a graph more lovely than a tree a graph whose crucial property is loop-free connectivity.
More informationConfiguring Spanning Tree Protocol
Restrictions for STP Restrictions for STP, on page 1 Information About Spanning Tree Protocol, on page 1 How to Configure Spanning-Tree Features, on page 13 Monitoring Spanning-Tree Status, on page 25
More informationCIS 83 Midterm Spring 2004 Answer Sheet Name Score Grade Question Answer Question Answer
CIS 83 Midterm Spring 2004 Answer Sheet Name: Score: Grade: Question Answer Question Answer 1 A B C D E F 51 A B C D E F 2 A B C D E F 52 A B C D E F 3 A B C D E F 53 A B C D E F 4 A B C D E F 54 A B C
More informationConfiguring Rapid PVST+ Using NX-OS
Configuring Rapid PVST+ Using NX-OS This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices. This chapter includes the following sections:
More informationCommunication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner
Communication Networks (0368-3030) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University Allon Wagner Kurose & Ross, Chapters 5.5-5.6 (5 th ed.) Tanenbaum & Wetherall, Chapters 4.3.4
More informationPrepKing. PrepKing
PrepKing Number: 350-001 Passing Score: 800 Time Limit: 180 min File Version: 9.3 http://www.gratisexam.com/ PrepKing 350-001 Sections 1. Section 1.00 - Implement Layer 2 2. Section 2.00 - Implement IPv4
More informationBuy full file at
14 Chapter 2 LAN Redundancy Chapter 2 LAN Redundancy 2.0.1.2 Class Activity Stormy Traffic ( ) Objective Explain the purpose of the Spanning Tree Protocol (STP) in a switched LAN environment with redundant
More informationConfiguring Spanning Tree Protocol
Finding Feature Information, page 1 Restrictions for STP, page 1 Information About Spanning Tree Protocol, page 2 How to Configure Spanning-Tree Features, page 14 Monitoring Spanning-Tree Status, page
More informationConfiguring Optional Spanning-Tree Features
CHAPTER 20 This chapter describes how to configure optional spanning-tree features on the Catalyst 3750-E or 3560-E switch. You can configure all of these features when your switch is running the per-vlan
More informationImplementation of the meshed tree algorithm on a switched network
Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 12-10-2016 Implementation of the meshed tree algorithm on a switched network Kuhu Sharma kxs3104@rit.edu Follow
More informationChapter 3 Lab 3-1, Spanning Tree Protocol (STP) Default Behavior
Chapter 3 Lab 3-1, Spanning Tree Protocol (STP) Default Behavior Topology Objective Background Observe the default behavior of STP. Four switches have just been installed. The distribution layer switches
More informationTroubleshooting Transparent Bridging Environments
Troubleshooting Transparent Bridging Environments Document ID: 10543 This information from the Internetwork Troubleshooting Guide was first posted on CCO here. As a service to our customers, selected chapters
More informationChapter 3 Part 2 Switching and Bridging. Networking CS 3470, Section 1
Chapter 3 Part 2 Switching and Bridging Networking CS 3470, Section 1 Refresher We can use switching technologies to interconnect links to form a large network What is a hub? What is a switch? What is
More informationWhy Packet Switching on LAN? Packet Switching on L2 (LAN Level) Bridge / Router. Agenda
Why Packet Switching on LN? Packet Switching on L2 (LN Level) Transparent Bridging (TB), Spanning Tree Protocol (STP), Rapid STP, L2 Bridging versus L3 Routing LN was primarily designed for shared media
More informationCS4700/CS5700 Fundamentals of Computer Networks
CS4700/CS5700 Fundamentals of Computer Networks Lecture 9: Bridging Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu Northeastern
More informationConfiguring Rapid PVST+
This chapter describes how to configure the Rapid per VLAN Spanning Tree (Rapid PVST+) protocol on Cisco NX-OS devices using Cisco Data Center Manager (DCNM) for LAN. For more information about the Cisco
More informationSpanning Tree Configuration
Using the Console Interface Spanning Tree Configuration The Spanning Tree Configuration Menu screen (Figure 3-29) allows you to view spanning tree parameters and configure individual switch ports to participate
More information62HConfiguring port role restriction 131H37. 63HConfiguring TC-BPDU transmission restriction 132H38. 64HEnabling TC-BPDU guard 133H38
Contents Configuring spanning tree protocols 3 STP 3 STP protocol packets 3 Basic concepts in STP 4 Calculation process of the STP algorithm 5 RSTP 9 MSTP 10 MSTP features 10 MSTP basic concepts 10 How
More informationSpanning Tree Protocol Root Guard Enhancement
Spanning Tree Protocol Root Guard Enhancement Document ID: 10588 Contents Introduction Prerequisites Requirements Components Used Conventions Feature Description Availability Configuration CatOS Configuration
More informationToken Ring VLANs and Related Protocols
CHAPTER 4 Token Ring VLANs and Related Protocols A VLAN is a logical group of LAN segments, independent of physical location, with a common set of requirements. For example, several end stations might
More informationJN0-343 Q&As. Juniper Networks Certified Internet Specialist (JNCIS-ENT) Pass Juniper JN0-343 Exam with 100% Guarantee
JN0-343 Q&As Juniper Networks Certified Internet Specialist (JNCIS-ENT) Pass Juniper JN0-343 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee
More informationLink layer: introduction
Link layer: introduction terminology: hosts and routers: nodes communication channels that connect adjacent nodes along communication path: links wired links wireless links LANs layer-2 packet: frame,
More informationTable of Contents Chapter 1 MSTP Configuration
Table of Contents Table of Contents... 1-1 1.1 MSTP Overview... 1-1 1.1.1 MSTP Protocol Data Unit... 1-1 1.1.2 Basic MSTP Terminologies... 1-2 1.1.3 Implementation of MSTP... 1-6 1.1.4 MSTP Implementation
More informationQuestion No: 1 On the MSTP network as shown in the figure, what is the role of the switch in MSTI 1 according to the configuration?
Volume: 629 Questions Question No: 1 On the MSTP network as shown in the figure, what is the role of the switch in MSTI 1 according to the configuration? A. Root switch B. Slave switch C. Non-root switch
More informationLecture (06) Design and Configuration LAN Practicing, working on CISCO equipment. By: Dr. Ahmed ElShafee
Lecture (06) Design and Configuration LAN Practicing, working on CISCO equipment By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Practical App. Networks II Part I ٢ ٣ SW01 steps firstly connect
More informationCCNA Layer 2 switching. Revision no.: PPT/2K605/03
CCNA 640-801 Layer 2 switching Revision no.: PPT/2K605/03 What is Switching? It breaks the Collision Domain It takes the packet and forwards to destined port without any modification. Network still remains
More informationCatalyst Switch Operations. 2000, Cisco Systems, Inc. 6-1
Catalyst Switch Operations 2000, Cisco Systems, Inc. 6-1 Objectives Upon completion of this chapter, you will be able to perform the following tasks: Describe Layer 2 switching (bridging) operations Describe
More information802.1AS Fast Master Clock Selection
802.1AS Fast Master Clock Selection Moving 802.1AS closer to RSTP Version 2 Norman Finn Cisco Systems 1 Introduction 2 Introduction IEEE 1588 networks that contain transparent clocks and the current draft
More informationCCNA 3 (v v6.0) Chapter 3 Exam Answers % Full
CCNA 3 (v5.0.3 + v6.0) Chapter 3 Exam Answers 2017 100% Full ccnav6.com /ccna-3-v5-0-3-v6-0-chapter-3-exam-answers-2017-100-full.html CCNA Exam Answers 2017 CCNA 3 (v5.0.3 + v6.0) Chapter 3 Exam Answers
More informationChapter 5. Spanning Tree Protocol (STP) Part II
Chapter 5 Spanning Tree Protocol (STP) Part II CCNA3-1 Chapter 5-2 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor, Ontario.
More informationWhat is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals
What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting
More informationExam Questions
Exam Questions 200-105 ICND2 Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0) https://www.2passeasy.com/dumps/200-105/ 1.At which layer of the OSI model is RSTP used to prevent loops? A. physical
More informationConfiguring STP and Prestandard IEEE 802.1s MST
20 CHAPTER This chapter describes how to configure the Spanning Tree Protocol (STP) and prestandard IEEE 802.1s Multiple Spanning Tree (MST) protocol on Catalyst 6500 series switches. Note The IEEE 802.1s
More informationTable of Contents 1 MSTP Configuration 1-1
Table of Contents 1 MSTP Configuration 1-1 Overview 1-1 Introduction to STP 1-1 Why STP 1-1 Protocol Packets of STP 1-1 Basic Concepts in STP 1-2 How STP works 1-3 Introduction to RSTP 1-9 Introduction
More informationManaging Network Spanning Trees
CHAPTER 8 This chapter describes, the IEEE 802.1d Spanning Tree Protocol (STP), and how to use and configure Cisco s proprietary spanning-tree protocols, Per VLAN Spanning Tree (PVST), Multiple Spanning
More informationImage courtesy Cisco Systems, Inc. Illustration of a Cisco Catalyst switch
by Jeff Tyson If you have read other HowStuffWorks articles on networking or the Internet, then you know that a typical network consists of nodes (computers), a connecting medium (wired or wireless) and
More informationRouting. Information Networks p.1/35
Routing Routing is done by the network layer protocol to guide packets through the communication subnet to their destinations The time when routing decisions are made depends on whether we are using virtual
More informationH3C S10500 Attack Protection Configuration Examples
H3C S10500 Attack Protection Configuration Examples Copyright 2015 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by any
More informationCIS 83 Lab Assignment
CIS 83 Lab Assignment Open the Packet Tracer Scenario STP Configuration Lab-1.pkt. Before proceeding, save as STP Configuration Lab-1-working.pkt. To demonstrate completion of the lab you will be asked
More informationSpanning Tree Operations. Topology Changes & Topology Change BPDUs
Spanning Tree Operations Topology Changes & Topology Change BPDUs 1 Rationale: There are a lot of misconceptions concerning Topology Changes and Topology Change BPDUs, these misconceptions are predicated
More informationIndex. Numerics. Index p priority (QoS) definition Q VLAN standard w as a region 5-54
Index Numerics 802.1p priority (QoS) 802.1Q VLAN standard 5-7 802.1w as a region 5-54 A active path 5-5 address IP 7-8 advertisement 3-3 applicable products 1-ii ARP age setting 7-10 cache 7-4 cache table
More informationmaterial. For more information on how to get additional questions, please see
Review Questions The following questions are designed to test your understanding of this chapter s material. For more information on how to get additional questions, please see www.lammle.com/ccn a. You
More informationTop-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Original slides copyright by Cisco Press & Priscilla Oppenheimer Network Topology Design Issues Hierarchy Redundancy Modularity Well-defined
More informationData Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies
Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services
More informationConfiguring MSTP CHAPTER
CHAPTER 16 Configuring MSTP This chapter describes how to configure the Cisco implementation of the IEEE 802.1s Multiple STP (MSTP) on the Catalyst 2960 switch. Note The multiple spanning-tree (MST) implementation
More informationUnderstanding Multiple Spanning Tree Protocol (802.1s)
Understanding Multiple Spanning Tree Protocol (802.1s) Document ID: 24248 Introduction Where to Use MST PVST+ Case Standard 802.1q Case MST Case MST Region MST Configuration and MST Region Region Boundary
More informationExam4Tests. Latest exam questions & answers help you to pass IT exam test easily
Exam4Tests http://www.exam4tests.com Latest exam questions & answers help you to pass IT exam test easily Exam : 200-101 Title : Interconnecting Cisco Networking Devices Part 2 (ICND2) Vendor : Cisco Version
More informationTable of Contents. (Rapid) Spanning Tree Protocol. A simple bridge loop. An even worse bridge loop. Bridge loops Two bridges Three bridges (R)STP
Table of Contents (Rapid) Spanning Tree Protocol (R)STP Karst Koymans Informatics Institute University of Amsterdam (version 18.4, 2018/11/16 13:23:04) Friday, November 16, 2018 Bridge loops Two bridges
More informationTestsDumps. Latest Test Dumps for IT Exam Certification
TestsDumps http://www.testsdumps.com Latest Test Dumps for IT Exam Certification Exam : 200-105 Title : Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0) Vendor : Cisco Version : DEMO Get Latest
More informationCisco Understanding Multiple Spanning Tree Protocol (802.1
Cisco Understanding Multiple Spanning Tree Protocol (802.1 Table of Contents Understanding Multiple Spanning Tree Protocol (802.1s)...1 Introduction...1 Where to use MST...2 PVST+ Case...2 Standard 802.1q
More informationDescribing the STP. 2003, Cisco Systems, Inc. All rights reserved. 2-1
Describing the STP 2003, Cisco Systems, Inc. All rights reserved. 2-1 IEEE Documents IEEE 802.1D IEEE 802.1Q IEEE 802.1w IEEE 802.1s - Media Access Control (MAC) bridges - Virtual Bridged Local Area Networks
More informationCSE 473 Introduction to Computer Networks. Final Exam. Your Name: 12/17/2014 PLEASE WRITE LEGIBLY NO POINTS FOR ILLEGIBLE ANSWERS
CSE 47 Introduction to Computer Networks Roch Guérin Final Exam Your Name: 12/17/2014 PLEASE WRITE LEGIBLY NO POINTS FOR ILLEGIBLE ANSWERS 1. [10 points] Bob has been provided with the following pair of
More informationLecture 7. Reminder: Homework 2, Programming Project 1 due today. Homework 3, Programming Project 2 out, due Thursday next week. Questions?
Lecture 7 Reminder: Homework 2, Programming Project 1 due today. Homework 3, Programming Project 2 out, due Thursday next week. Questions? Thursday, September 15 CS 475 Networks - Lecture 7 1 Outline Chapter
More informationLecture (08) Wireless Traffic Flow and AP Discovery
Lecture (08) Wireless Traffic Flow and AP Discovery Dr. Ahmed ElShafee 1 Dr. Ahmed ElShafee, ACU Spring 2011, Wireless Network Agenda Wireless Frame Types Sending a Frames Wireless Frame Headers Frame
More informationCommunication Networks
Communication Networks Spring 2018 Laurent Vanbever nsg.ee.ethz.ch ETH Zürich (D-ITET) March 19 2018 Materials inspired from Scott Shenker & Jennifer Rexford Last week on Communication Networks Reliable
More informationMSTP Technology White Paper
MSTP Technology White Paper Key words: STP, RSTP, MSTP, rapid transition, multiple instances, redundancy loop, redundancy link, load sharing Abstract: This article introduces basic MSTP terms, MSTP algorithm
More informationCompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch 3.1.5 & 3.2 Xiaowei Yang xwy@cs.duke.edu Review Past lectures Single link networks Point-to-point,
More informationAccess Technologies! Fabio Martignon
Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several
More information